Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data., and . CCS, page 1518-1529. ACM, (2015)Verifiable Random Functions from Identity-Based Key Encapsulation., , and . EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, page 554-571. Springer, (2009)Inner-Product Functional Encryption with Fine-Grained Access Control., , , and . ASIACRYPT (3), volume 12493 of Lecture Notes in Computer Science, page 467-497. Springer, (2020)A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications., , and . ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, page 37-54. Springer, (2003)Authenticating Computation on Groups: New Homomorphic Primitives and Applications., , and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 193-212. Springer, (2014)Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys., , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 254-274. Springer, (2015)Coercion-resistant electronic elections., , and . WPES, page 61-70. ACM, (2005)An Efficient Algorithm for the Approximate Median Selection Problem., , , , and . CIAC, volume 1767 of Lecture Notes in Computer Science, page 226-238. Springer, (2000)On the Security Notions for Homomorphic Signatures., , and . IACR Cryptol. ePrint Arch., (2016)Constant Round Authenticated Group Key Agreement from General Assumpions, and . Public Key Cryptography -- PKC 2004, volume 2947 of Lecture Notes in Computer Science, page 115--129. Springer, (2004)